How can companies and employees who start to adapt to hybrid working practices protect themselves against cloud security threats?
Now that organizations are set to evolve a hybrid blend of home and office-based work for most employees, it is more important then ever to address the risks that insider threat can pose
The Zero Trust architecture offers an increasingly popular way to minimize cyber-risk in a world of hybrid cloud, flexible working and persistent threat actors.
How can organizations mitigate the risk of damaging cyberattacks while juggling the constantly changing mix of office and off-site workers?
Money doesn’t buy you happiness – cryptocurrency doesn’t buy you a genuine COVID-19 vaccine
Neither clinical research into the coronavirus nor any patient data were affected by the incident
The vaccination push provides a vital shot in the arm for the world’s battle against the pandemic, but it's also a topic ripe for exploitation by fraudsters and purveyors of misinformation
The US Federal Trade Commission received 1.4 million reports of identity theft last year, double the number from 2019
The documents related to COVID-19 vaccine and medications were stolen from the EU's medicines agency last month
Cybercriminals look to cash in on the vaccine rollout, including by falsely offering to help people jump the line
You don’t need a degree in cybersecurity or a bottomless budget to do the security basics well – here are five things that will get you on the right track
Cybercriminals take aim at teleworkers, setting up malicious duplicates of companies' internal VPN login pages
ESET malware researcher Lukas Stefanko gives us a peek behind the scenes of his analysis of CryCryptor ransomware and puts the threat into a broader context
Can a technological intervention stem the pandemic while avoiding the privacy pitfalls of location tracking?
And many of them didn’t receive any new security training or tools from their employer to properly secure the devices, a study finds
The pandemic has highlighted the need for businesses to act with alacrity and prepare for the long haul – and to do so with cybersecurity in mind
Scammers rehash old campaigns, create credit card-stealing websites and repurpose information channels to milk the COVID-19 crisis for all it's worth
Being at your beck and call is central to the "personality" of your digital friend, but there are situations when the device could use some time off
Scams demanding bitcoin on pain of infecting you with the coronavirus gain their fair share of shine among schemes with a thin veneer of plausibility
The tool, which comes after a similar effort by Google, looks at how people’s traveling behavior has changed since the start of the pandemic